Spread the love

1. What are some examples of security goals that you may have for an organization? Check all that apply.

  • To protect customer data from unauthorized access
  • To prevent unauthorized access to customer credentials
  • To implement a strong password policy
  • To deploy an Intrusion Prevention System

2. Which of these would you consider high-value targets for a potential attacker? Check all that apply.

  • Authentication databases
  • Customer credit card information
  • Logging server
  • Networked printers

3. What’s the purpose of a vulnerability scanner?

  • It protects your network from malware.
  • It blocks malicious traffic from entering your network.
  • It detects vulnerabilities on your network and systems.
  • It fixes vulnerabilities on systems.

4. What are some restrictions that should apply to sensitive and confidential data? Check all that apply.

  • It can be transferred via email.
  • It can be accessed and stored on personal devices.
  • It can be accessed and stored on personal devices.
  • It can be stored on encrypted media only.

5. What’s a privacy policy designed to guard against?

  • Eavesdropping on communications
  • Misuse or abuse of sensitive data
  • Attackers stealing customer data
  • Denial-of-service attacks

6. Which of the following are actions and/or steps that can be taken to avoid leaks and disclosures when handling sensitive data?

  • Giving the employees the right tools to get their work done without compromising security.
  • Understanding what employees need to do to accomplish their jobs.
  • Giving unrestricted access to the employees handling sensitive data
  • Allowing employees to write their passwords on a post-it note

7. When evaluating the services of a vendor company, which of the following can be used to assess their security capabilities? Check all that apply.

  • Ask the vendor to complete a questionnaire
  • Assume that they’re using industry-standard solutions
  • Request full access to the vendor systems to perform an assessment
  • Ask them to provide any penetration testing or security assessment reports

8. What is the goal of mandatory  IT security training for an organization? Check all that apply.

  • To punish employees with poor security practices
  • To educate employees on how to stay secure
  • To build a culture that prioritizes security
  • To avoid the need for a security team

9. Which of the following are necessary in the organization to create a culture that makes security a priority? Select all that apply.

  • Reinforce and reward behaviors that boost the security of the organization
  • A working environment that encourages people to speak up.
  • Punish employees every time they make poor security practices
  • Designated communication channels

10. A long and complex password requirement is designed to protect against _________.

  • lazy users
  • employees memory lost
  • brute force attacks
  • password reuse

11. In order to properly handle a security incident, what is the first thing that needs to happen?

  • Recover from the incident
  • Remove or eradicate the incident
  • Contain the incident
  • Detect the incident

12. After a security incident, how can an organization be protected against a similar incident occurring again in the future?

  • Update antivirus definitions.
  • Cross your fingers and hope for the best!
  • Change all account passwords.
  • Conduct a post-incident analysis.

13. In order to preserve the integrity of any forensic evidence, what should be done before analyzing a hard drive that has been compromised by a security attack?

  • Install an antivirus software
  • Format the hard drive
  • Make a virtual copy or an image of the hard drive
  • Connect the hard drive to a computer

14. Which of the following are protection that can be used on mobile devices?

  • Screen lock
  • Use the device settings to allow or deny apps access to the devices features
  • Always have bluetooth on
  • Storage encryption

15. In order to prevent further damage, the breach should be ________.

  • contained
  • recovered
  • audited
  • ignored

16. In the Payment Card Industry Data Security Standard (PCI DSS), which of these goals would benefit from encrypted data transmission?

  • Implementing strong access control measures
  • Maintaining a vulnerability management program
  • Monitoring and testing networks regularly
  • Protecting cardholder data

17. What tools can be used to discover vulnerabilities or dangerous misconfigurations in systems and networks?

  • Vulnerability scanners
  • Bastion hosts
  • Firewalls
  • Antimalware software

18. _____ is the practice of attempting to break into a system or network for the purpose of verifying the systems in place.

  • Network probing
  • Penetration testing
  • Security assessment
  • Vulnerability scanning

19. Which of the following should be part of an access data request? Select all that apply.

  • Specify exact data needed
  • Provide justification
  • Time limit
  • A second signature

20. Which of the following is recommended to secure authentication?

  • Password rotation
  • Strong encryption
  • 2-factor authentication
  • Vulnerability scanning

21. When thinking about credential theft, what is one of the greatest workplace  cybersecurity risks?

  • Keylogging
  • Credential stealing text messages
  • Phishing emails
  • Blackmail

22. Which of the following actions should be included when conducting a vendor risk review? Select all that apply.

  • Ask the vendor for a cost comparison
  • Talk to the vendor’s employees
  • Ask the vendor to fill out a security questionnaire
  • Test the vendor’s hardware or software

23. What are some things that are generally included on a third party security assessment report? Select all that apply

  • User reviews
  • Third party security audit results
  • Penetration testing results
  • Customer feedback scores

24. Management wants to build a culture where employees keep security in mind. Employees should be able to access information freely and provide feedback or suggestions without worry. Which of these are great ideas for this type of culture? Select all that apply.

  • Designated mailing list
  • Posters promoting good security behavior
  • Desktop monitoring software
  • Bring your own device

25. Once the scope of the incident is determined, the next step would be _____.

  • escalation
  • containment
  • documentation
  • remediation

26. In the Payment Card Industry Data Security Standard (PCI DSS), what are the requirements for the “regularly monitor and test networks” objective? Select all that apply

  • Develop and maintain secure systems and applications
  • Regularly test security systems and processes
  • Track and monitor all access to network resources and cardholder data
  • Encrypt the transmission of cardholder data across open public networks

27. What characteristics are used to assess the severity of found vulnerabilities? Select all that apply.

  • Remotely exploitable or not
  • Use of encryption or not
  • Type of access gained
  • Chance of exploitation

28. Which of the following devices are considered a risk when storing confidential information?

Select all that apply.

  • Encrypted portable hard drives
  • Limited access file shares
  • CD drives
  • USB sticks

29. Which of the following are ways to prevent email phishing attacks against user passwords? Select all that apply.

  • User education
  • Virtual private network
  • Cloud email
  • Spam filters

30. When contracting services from a third party, what risk is the organization exposed to?

  • Zero-day vulnerabilities
  • Trusting the third party’s security
  • Malware attacks
  • DDoS attacks

31. Periodic mandatory security training courses can be given to employees in what way? Select all that apply.

  • Brief quiz
  • One-on-one interviews
  • Interoffice memos
  • Short video

32. How can events be reconstructed after an incident?

  • By reviewing and analyzing logs
  • By interviewing the people involved
  • By doing analysis of forensic malware
  • By replaying security video footage

33. What is the first step in performing a security risk assessment?

  • Logs analysis
  • Threat modeling
  • Vulnerability scanning
  • Penetration testing

35. What is penetration testing?

  • Giving network access to a bad actor for the purposes of testing.
  • Assessing computers, computer systems, networks, or applications for weaknesses.
  • Attempting to break into a system or network for the purpose of verifying the systems in place.
  • Attempting to gather credentials with phishing emails.

36. Consider the following scenario:

A co-worker needs to share a sensitive file with you, but it is too large to send via an encrypted email. The co-worker works out of a remote office. You work at headquarters. Which of these options would most likely be approved by the company’s security policies? Select all that apply.

  • Upload to company secure cloud storage
  • Upload to a personal OneDrive
  • Put on a company file server that you both have access to
  • Upload to a personal Google drive

36. Google provides free _____, which is a good starting point when assessing third-party vendors.

  • cloud storage
  • vendor security assessment questionnaires
  • mobile phone services
  • business apps

37. What are the first two steps of incident handling and response?

  • Incident eradication or removal
  • Incident recovery
  • Incident detection
  • Incident containment

38. When working on a laptop in a public area, always _____ when getting up to use the restroom.

  • Ask a coworker to watch the laptop
  • Set up a VPN
  • Lock the screen
  • Ask permission to leave

39. What is a quick way of evaluating a third party’s security?

  • A comprehensive penetration testing review
  • A security assessment questionnaire
  • A signed contract
  • A manual evaluation of all security systems

40. When handling credit card payments, the organization needs to adhere to the _____.

  • ISO
  • HIPAA
  • PCI DSS
  • IEEE

41. What characteristics are used to assess the severity of found vulnerabilities? Select all that apply.

  • Remotely exploitable or not
  • Type of access gained
  • Chance of exploitation
  • Use of encryption or not

42. Which of the following are bad security habits commonly seen amongst employees in the workplace? Select all that apply.

  • Password on a post-it note
  • Log out of website session
  • Leave laptop logged in and unattended
  • Lock desktop screen

43. Which of the following are examples of security tools that can scan computer systems and networks for vulnerabilities? Select all that apply.

  • Wireshark
  • Nessus
  • OpenVAS
  • Qualys

44. Consider the following scenario:

Your company wants to establish good privacy practices in the workplace so that employee and customer data is properly protected. Well-established and defined privacy policies are in place, but they also need to be enforced. What are some ways to enforce these privacy policies? Select all that apply.

  • Print customer information
  • Audit access logs
  • Apply the principle of least privilege
  • VPN connection

45. Third-party services that require equipment on-site may require a company to do which of the following? Select all that apply.

  • Unrestricted access to the network
  • Provide additional monitoring via a firewall or agentless solution
  • Provide remote access to third-party service provider
  • Evaluate hardware in the lab first

46. What are some behaviors to be encouraged in order to build a security-conscious culture? Select all that apply.

  • Locking your screen
  • Shaming people who haven’t done a good job of ensuring their company’s security
  • Checking website URLs when authenticating
  • Asking security-related questions

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *